Published at: 12:11 pm - Saturday November 16 2013
The NCA’s National Cyber Crime Unit are aware of a mass email spamming event that is ongoing, where people are receiving emails that appear to be from banks and other financial institutions. The emails may be sent out to tens of millions of UK customers, but appear to be targeting small and medium […]
Published at: 06:12 pm - Wednesday December 26 2012
Request for comments – I would be interested in knowing your thoughts and opinions on the topic of “Digital Forensics within Infrastructure-as-a-Service (IaaS) Environments. For my sins I have chosen this as the subject for my dissertation and although I could happily write thousands upon thousands of words (Plenty of practice writing forensic reports…) of […]
Published at: 06:12 pm - Wednesday December 26 2012
Even when I was starting to study my degree just some 4 years ago in Digital Forensics and IT Security there appeared to be very little interest in the subject of IT as a whole, let alone Digital Forensics and Ethical Hacking from women. Some three women appeared in the lecture hall on the first day of the course […]
Published at: 07:02 pm - Saturday February 18 2012
When it comes to collecting forensic evidence from cloud providers and determining whether a data breach has occurred, what used to take two weeks now takes a month for Greg Thompson, vice president of enterprise security services at Scotia Bank. “Often we find it is a challenge to get sufficient forensic data from the cloud to prove […]
Published at: 07:02 pm - Saturday February 18 2012
Joseph Naghdi, an experienced computer technologist, transitioned to digital forensics in early 2000 because he was intrigued by how data is stored and discovered on computers. Today, he’s a forensics analyst at Computer Forensics Lab, aU.K.consultancy specializing in computer forensic services and advanced data recovery. Thehigh pointof his work, he says, is when he solves […]
Published at: 05:01 pm - Monday January 16 2012
Sophos HQ in Abingdon on Saturday 14th January was the scene for the first face-to-face encounter in this year’s Cyber Security Challenge UK. Thirty talented candidates from across the UK battled in a malware hunt which exposed them to some of the criminal world’s nastiest pieces of malicious code, housed within the Sophos vaults.
Published at: 03:11 pm - Saturday November 12 2011
I don’t know where it’s from or who’s behind it…CanYouCrackIt.co.uk? Following our earlier article on ForHacSec.com about the online game CanYouCrackIt.co.uk a video has been uplaoded to YouTube about the challenge. “This code – I don’t know where it’s from or who’s behind it – I don’t know much to be honest I […]
Published at: 12:11 pm - Thursday November 03 2011
The ForHacSec.com team have recently come across the Can You Crack It? game for those interested in the security arena particularly around Hacking, Pen-Testing and Coding. So we thought we’d share it with you and see what results you get. It’s an interesting game and is designed to test the skills of a would be […]
Published at: 02:10 pm - Sunday October 30 2011
If you want an easy to follow, step by step guide to analyzing and testing Wi-Fi security, look no further than Vivek Ramachandran’s “BackTrack 5 Wireless Penetration Testing Beginner’s Guide“. The author guides you on a path from the basic principles of Wi-Fi to advanced monitoring and attacks. Vivek starts you out by preparing your […]
Published at: 01:10 pm - Sunday October 30 2011
You are probably familiar with the classic security assessments: internal and external penetration testing, security risk assessments, and PCI gap assessments. You may not be as familiar with, or even aware of, other assessments that may be just as valuable for strengthening your security program. Some of these less familiar assessments are new, the result […]